#hashes you
#hashes you
@Wrewdison tagging #hashes to filter out the timeline based on tags.
Mandiant releases rainbow table that cracks weak admin password in 12 hours https://arstechni.ca/Ukpp #passwordcracking #Security #Biz&IT #hashes #ntlm
#Development #Pitfalls
Oops, my UUIDs collided! · How Universally Unique Identifiers can collide https://ilo.im/1682w2
_____
#Identifiers #Collisions #UUID #Mistakes #Attacks #Hashes #JavaScript #WebDev #Frontend #Backend
🎉 Wow, who knew #Kubernetes needed another layer of complexity? Enter #Flox, where you can now enjoy the thrill of pulling hash-pinned packages and living in fear of #cryptographic #hashes, all while pretending your deployments are suddenly faster. 🚀 Because nothing says "cutting-edge" like making your #DevOps life an even bigger nightmare. 😜
https://flox.dev/kubernetes/ #complexity #HackerNews #ngated
🎩🧐 Oh, brilliant! Let's #swap a relational #database with a #version #control system because, who needs sanity, right? 😂 Just imagine querying your data with #commit hashes—what could possibly go wrong? 🤦♂️
https://devcenter.upsun.com/posts/why-you-should-replace-postgresql-with-git-for-your-next-project/ #hashes #tech #humor #HackerNews #ngated
New Cryptanalysis of the Fiat-Shamir Protocol
A couple of months ago, a new paper demonstrated some new attacks against the Fiat-Shamir transformation. Quanta published a <a href="https://www.quantamagazine.org/computer-scientists-figure-o... https://www.schneier.com/blog/archives/2025/09/new-cryptanalysis-of-the-fiat-shamir-protocol.html
#academicpapers #Uncategorized #cryptanalysis #protocols #hashes
#Development #Guides
Hash functions deep dive · Demystifying a key concept for developers https://ilo.im/162eh5
_____
#Programming #Algorithms #Data #Hashes #JavaScript #WebPerf #WebDev #Frontend #Backend
Flagg and I have published our write up on how we solved the $1,000 Holiday #Puzzle hosted by #hashkiller. A shout out to #Hashes and #freeroute from #HK for putting this on.
This puzzle was unique, and at times gave us a run for our money, but persistence and teamwork ultimately paid off.
Good Essay on the History of Bad Password Policies
Stuart Schechter makes some good points on the history of bad password policies:
Morris and Thompson’s work brought much-needed data to highlight a problem ... https://www.schneier.com/blog/archives/2024/11/good-essay-on-the-history-of-bad-password-policies.html
@jonny @josephcox
Thank you for this link. I love the series
#InfoSec #networkSecurity #MFA #2FA
#Salted #Hashes #Podcast #Darknet
Internet Archive Wayback Machine has been breached 31*1000.000 records have been stolen
#InfoSec #networkSecurity #MFA #2FA
#Salted #Hashes #InternetArchive #WaybackMachine #Programming
Verify Your Downloads Like a PRO!
(3/7)
Rainbow tables for LM #hashes are provided for f#ree by the #developers By default, Ophcrack is #BundledDonations with tables that allow it to crack passwords no longer than 14 characters using only alphanumeric characters. Available for free download are four #WindowsXP tables and four #WindowsVista tables.
#Rainbowtables are #precomputed tables of #hashes used to #crack #passwords #Ophcrack is a free open-source #program that uses rainbow tables to crack #Windows log-in passwords. It can import hashes from a variety of formats, including dumping directly from the #SAM files of Windows, and can be run via the #commandline or using the program’s #gui
(1/7)
It is mind-blowing that large linear systems show up in the methodology for construction of perfect #hashes and that "randomization" (effectively simple #montecarlo) was used to come up with hashing functions for fixed sets. The number of use cases of #linearalgebra is unreal.
#Outlook #Vulnerability Discovery and New Ways to #Leak #NTLM #Hashes
https://www.varonis.com/blog/outlook-vulnerability-new-ways-to-leak-ntlm-hashes
Basic Static Analysis - I have just completed this room! Check it out: https://tryhackme.com/room/staticanalysis1 #tryhackme #security #blueteam #malwareanalysis #reverseengineering #windows #pe #staticanalysis #hashes #strings #stringsearch #yara #staticanalysis1 via @RealTryHackMe
@Juro With #single-#use #cryptographic #hashes, we could still enable somewhat strong #anonymity together with strong human id #verification.
Learning from India’s Aadhar system, it is clear that a single #token isn’t good enough.
Perhaps something similar to blockchain, where you can mine some tokens that identify you. And you can throw away like wallets to escape tracking when you need to.
Dumping NT Hashes from Azure Active Directory
#Azure #aad #hashes #AlwaysBeCracking #ABC
https://aadinternals.com/talks/Dumping%20NTHashes%20from%20AAD.pdf